An in silico evaluation of the ADMET profile of the StreptomeDB database

نویسنده

  • Fidele Ntie-Kang
چکیده

BACKGROUND Computer-aided drug design (CADD) often involves virtual screening (VS) of large compound datasets and the availability of such is vital for drug discovery protocols. This paper presents an assessment of the "drug-likeness" and pharmacokinetic profile of > 2,400 compounds of natural origin, currently available in the recently published StreptomeDB database. METHODS The evaluation of "drug-likeness" was performed on the basis of Lipinski's "Rule of Five", while 46 computed physicochemical properties or molecular descriptors were used to predict the absorption, distribution, metabolism, elimination and toxicity (ADMET) of the compounds. RESULTS This survey demonstrated that, of the computed molecular descriptors, about 28% of the compounds within the StreptomeDB database were compliant, having properties which fell within the range of ADMET properties of 95% of currently known drugs, while about 44% of the compounds had ≤ 2 violations. Moreover, about 50% of the compounds within the corresponding "drug-like" subset showed compliance, while >83% of the "drug-like" compounds had ≤ 2 violations. CONCLUSIONS In addition to the previously verified range of measured biological activities, the compounds in the StreptomeDB database show interesting DMPK profiles and hence could represent an important starting point for hit/lead discovery from natural sources. The generated data are available and could be highly useful for natural product lead generation programs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

StreptomeDB: a resource for natural compounds isolated from Streptomyces species

Bacteria from the genus Streptomyces are very important for the production of natural bioactive compounds such as antibiotic, antitumour or immunosuppressant drugs. Around two-thirds of all known natural antibiotics are produced by these bacteria. An enormous quantity of crucial data related to this genus has been generated and published, but so far no freely available and comprehensive databas...

متن کامل

In silico Prediction and Docking of Tertiary Structure of LuxI, an Inducer Synthase of Vibrio fischeri

Background: LuxI is a component of the quorum sensing signaling pathway in Vibrio fischeri responsible for the inducer synthesis that is essential for bioluminescence. Methods: Homology modeling of LuxI was carried out using Phyre2 and refined with the GalaxyWEB server. Five models were generated and evaluated by ERRAT, ANOLEA, QMEAN6, and Procheck. Results: Five refined models were gener...

متن کامل

O-30: Comparing Expression Patterns of Endometrial Genes in Implantation Failures and Recurrent Miscarriages with Fertile Couples Following ICSI/IVF Using in Silico Analysis

Background: To screen and diagnose patients with recurrent abortions and implantation failure after IVF/ICSI, differentially expressed genes of endometrium through DNA microarrays were monitored. Materials and Methods: Microarray expression profile of GSE26787 dataset from GEO database was used to analyze gene expression profiles of 15 endometrial biopsy samples- five from control fertile (CF) ...

متن کامل

ADMET Evaluation in Drug Discovery. 11. PharmacoKinetics Knowledge Base (PKKB): A Comprehensive Database of Pharmacokinetic and Toxic Properties for Drugs

Good and extensive experimental ADMET (absorption, distribution, metabolism, excretion, and toxicity) data is critical for developing reliable in silico ADMET models. Here we develop a PharmacoKinetics Knowledge Base (PKKB) to compile comprehensive information about ADMET properties into a single electronic repository. We incorporate more than 10 000 experimental ADMET measurements of 1685 drug...

متن کامل

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2013